Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2019-07-17 |
Product | Vision Dynamic Signage Director | Last view | 2021-10-06 |
Version | 5.0 | Type | Application |
Update | sp7 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:cisco:vision_dynamic_signage_director |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.1 | 2021-10-06 | CVE-2021-34742 | A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. |
6.5 | 2020-10-08 | CVE-2020-3598 | A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to access confidential information or make configuration changes. The vulnerability is due to missing authentication for a specific section of the web-based management interface. An attacker could exploit this vulnerability by accessing a crafted URL. A successful exploit could allow the attacker to obtain access to a section of the interface, which they could use to read confidential information or make configuration changes. |
6.5 | 2020-09-23 | CVE-2019-16004 | A vulnerability in the REST API endpoint of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected device. The vulnerability is due to missing authentication on some of the API calls. An attacker could exploit this vulnerability by sending a request to one of the affected calls. A successful exploit could allow the attacker to interact with some parts of the API. |
4.9 | 2020-07-16 | CVE-2020-3450 | A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an authenticated, remote attacker with administrative credentials to conduct SQL injection attacks on an affected system. The vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the web-based management interface and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data that is stored in the underlying database, including hashed user credentials. To exploit this vulnerability, an attacker would need valid administrative credentials. |
9.8 | 2019-07-17 | CVE-2019-1917 | A vulnerability in the REST API interface of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected system. The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to execute arbitrary actions through the REST API with administrative privileges on the affected system. The REST API is enabled by default and cannot be disabled. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
40% (2) | CWE-306 | Missing Authentication for Critical Function |
20% (1) | CWE-287 | Improper Authentication |
20% (1) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
20% (1) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-05 | Cisco Vision Dynamic Signage Director authentication bypass attempt RuleID : 50745 - Type : SERVER-WEBAPP - Revision : 1 |